-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
upgrade the guava version #4348
Comments
I will work on this issue |
Hello @Nanmozhi22, In order to qualify this item, could you please post in the ticket thread: Thanks, |
Hello @psavidis Here are the details which I got from the dependent bot , pls let me know Description : Upgrade com.google.guava:guava to version 32.0.0-android or later. For example: com.google.guava guava [32.0.0-android,)Vulnerability details : A temp directory creation vulnerability exists in Guava prior to version 32.0.0 allowing an attacker with access to the machine to potentially access data in a temporary directory created by the Guava com.google.common.io.Files.createTempDir(). The permissions granted to the directory created default to the standard unix-like /tmp ones, leaving the files open. Maintainers recommend explicitly changing the permissions after the creation of the directory, or removing uses of the vulnerable method. |
Is cve-2020-8908 the one you posted on the ticket? |
Hi @psavidis yes correct that is one : CVE ID |
Hello @Nanmozhi22, Apologies for the late response. This item has been of low criticality and due to heavy load i didn't manage to provide an answer earlier. However, here are a few notes i'd like to make:
Given the above, i recommend to skip this request at this point as not needed as Thank you for your interest to contribute 👍 KR, |
Upgrade com.google.guava:guava to fix 2 Dependabot alerts in qa/large-data-tests/pom.xml
com.google.guava guava [32.0.0-android,)Upgrade com.google.guava:guava to version 32.0.0-android or later. For example:
A temp directory creation vulnerability exists in Guava prior to version 32.0.0 allowing an attacker with access to the machine to potentially access data in a temporary directory created by the Guava com.google.common.io.Files.createTempDir(). The permissions granted to the directory created default to the standard unix-like /tmp ones, leaving the files open. Maintainers recommend explicitly changing the permissions after the creation of the directory, or removing uses of the vulnerable method.
The text was updated successfully, but these errors were encountered: